CVE Vulnerabilities

CVE-2010-2496

Improper Authentication

Published: Oct 18, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.8 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Cluster_glueClusterlabs*1.0.6 (excluding)
PacemakerClusterlabs*1.1.3 (excluding)
Cluster-glueUbuntutrusty*
Cluster-glueUbuntuupstream*
Cluster-glueUbuntuxenial*
PacemakerUbuntutrusty*
PacemakerUbuntuupstream*
PacemakerUbuntuxenial*

Potential Mitigations

References